Telegram Web Link
Modifying Sprunk vs eCola crew data

πŸ‘‰ https://hackerone.com/reports/1680818

πŸ”Ή Severity: Low | πŸ’° 250 USD
πŸ”Ή Reported To: Rockstar Games
πŸ”Ή Reported By: #bugstar
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 6, 2022, 6:24pm (UTC)
Subdomain takeover of β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/1457928

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #martinvw
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 6, 2022, 6:50pm (UTC)
The dashboard is exposed in https://β–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/1566758

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #alitoni224
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 6, 2022, 6:53pm (UTC)
XSS DUE TO CVE-2020-3580

πŸ‘‰ https://hackerone.com/reports/1606068

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #cruxn3t
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 6, 2022, 6:55pm (UTC)
Access to admininstrative resources/account via path traversal

πŸ‘‰ https://hackerone.com/reports/1326352

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #j4k3d
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 6, 2022, 6:59pm (UTC)
RXSS on β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/1626962

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #tmz900
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 6, 2022, 7:01pm (UTC)
Stored XSS at https://β–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/1620247

πŸ”Ή Severity: High
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #shanekag
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 6, 2022, 7:04pm (UTC)
β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ_log4j - https://β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/1631364

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #hachimanxienim
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 6, 2022, 7:07pm (UTC)
solr_log4j - http://β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/1631370

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #hachimanxienim
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 6, 2022, 7:10pm (UTC)
RXSS on β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/1627616

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #tmz900
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 6, 2022, 7:12pm (UTC)
Reflected cross site scripting in https://β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/1636345

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #maskedpersian
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 6, 2022, 7:30pm (UTC)
Reflected Xss in [β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ]

πŸ‘‰ https://hackerone.com/reports/1033253

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #s1m0x1
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 6, 2022, 7:32pm (UTC)
String length restriction byepass at https://callerfeel.mtnonline.com/profile/feedback.html

πŸ‘‰ https://hackerone.com/reports/1638347

πŸ”Ή Severity: High
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #aliyugombe
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 7, 2022, 8:48am (UTC)
πŸ‘1
Cleartext storage of sensitive information at https://staging.status.ai-apps-comms.ibm.com/env can lead to account takeover of several IBM employees

πŸ‘‰ https://hackerone.com/reports/1670586

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: IBM
πŸ”Ή Reported By: #zere
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 9, 2022, 3:14pm (UTC)
CVE-2022-21831: Possible code injection vulnerability in Rails / Active Storage

πŸ‘‰ https://hackerone.com/reports/1652042

πŸ”Ή Severity: High | πŸ’° 2,000 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #gquadros_
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 10, 2022, 7:12pm (UTC)
Access to arbitrary file of the Nextcloud Android app from within the Nextcloud Android app

πŸ‘‰ https://hackerone.com/reports/1408692

πŸ”Ή Severity: Low | πŸ’° 250 USD
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #luchua
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 11, 2022, 11:41am (UTC)
Signup with any Email and Enable 2-FA without verifying Email

πŸ‘‰ https://hackerone.com/reports/1543259

πŸ”Ή Severity: Medium | πŸ’° 350 USD
πŸ”Ή Reported To: Cloudflare Public Bug Bounty
πŸ”Ή Reported By: #imtheking
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 12, 2022, 2:15pm (UTC)
Response Manipulation leads to Admin Panel Login Bypass at https://admin.indevice.sonymobile.com/

πŸ‘‰ https://hackerone.com/reports/1508661

πŸ”Ή Severity: High
πŸ”Ή Reported To: Sony
πŸ”Ή Reported By: #0x2374
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 12, 2022, 7:00pm (UTC)
monerod JSON RPC server remote DoS

πŸ‘‰ https://hackerone.com/reports/1511843

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Monero
πŸ”Ή Reported By: #m31007
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 12, 2022, 9:50pm (UTC)
RCE via the DecompressedArchiveSizeValidator and Project BulkImports (behind feature flag)

πŸ‘‰ https://hackerone.com/reports/1609965

πŸ”Ή Severity: Critical | πŸ’° 33,510 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #vakzz
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 13, 2022, 4:40am (UTC)
πŸ”₯2
2025/10/24 11:25:29
Back to Top
HTML Embed Code: